2025/2026
Exam Prep Material
with
Verified Questions and Answers
A+ Grades Guarantee
, B. An information security policy comprises of processes,
procedures, and rules in an organization. The most important
aspect of a successful implementation of an information security
policy is the assimilation by all appropriate parties such as
Identify the most critical element employees, service providers, and business partners. Punitive
from the following for the actions for any violations are related to the education and
successful implementation and awareness of the policy.
ongoing regular maintenance of
an information security policy.
[BAC]
A.Management support and
approval for the information
security policy
B. Understanding of the
information security policy by all
appropriate parties
C. Punitive actions for any
violation of information security
rules
D. Stringent access control
monitoring of information security
rules
B. The immediate next step to evaluate the adequacy of a disaster
recovery plan once it has been implemented is to conduct a desk-
based evaluation which is also known as a paper test. The paper
Fair Lending has implemented a test involves walking through the plan and discussion on what
disaster recovery plan. Andrew, might happen in a particular type of service disruption with the
CFO of Fair Lending, wants to major stakeholders. As per the best practice, the paper test
ensure that the implemented plan precedes the preparedness test.
is adequate. Identify the
immediate next step from the
following.
Initiate the Full Operational Test
Initiate the Desk-based
Evaluation
Initiate the Preparedness Test
Socialize with the Senior
Management and Obtain
Sponsorship
D, Dry-pipe sprinkling systems are the most effective and
environmentally friendly from the available options. In this system,
the water does not flow until the fire alarm activates a pump.
There are various methods of
Water-based systems (sprinkler systems) are environmentally
suppressing a data center fire.
friendly but may not present the most effective option. In this
Identify the MOST effective and
system, the water is always present in the piping, which can
environmentally friendly method
potentially leak, causing damage to equipment.
from the following.
Water-based systems (sprinkler
systems)
Argonite systems
Carbon dioxide systems
Dry-pipe sprinkling systems
, B. IT risk management process comprises of following 5 steps:
Step 1: Asset Identification Step 2: Evaluation of Threats and
Vulnerabilities to Assets Step 3: Evaluation of the Impact Step 4:
Calculation of Risk Step 5: Evaluation of and Response to Risk
IT risk management process
comprises of following 5 steps
listed in no particular sequence.
(b) Asset Identification (e)
Evaluation of Threats and
Vulnerabilities to Assets (a)
Evaluation of the Impact (c)
Calculation of Risk (d) Evaluation
of and Response to Risk Identify
the correct sequence from the
following
b, a, e, c, d
b, e, a, c, d
b, e, a, d, c
a, b, c, d, e
D. The digital signature is used for verifying the identity of the
sender and the integrity of the content.
Palm Trading Company has
implemented digital signatures to
protect email communication with
their customers. Identify the
benefit of using a digital signature
from the following.
Protects email content from
unauthorized reading
Protects email content from data
theft
Ensure timely delivery of email
content
Ensures integrity of the email
content
, B An experienced project manager must be able to identify the
majority of key project risks at the beginning of the project, and
plan to deal with them when they do materialize
Merlin, head of information
systems audit at Cocoa Payroll
Services, was invited to a
development project meeting.
During the meeting, Merlin noted
that no project risks were
documented and raised this issue
with the head of IT. The IT project
manager opined that it was too
early to identify risks and that
they intend to hire a risk manager
if risks do start impacting the
project. Identify the likely
response from Merlin from the
following.
Express the willingness to work
with the risk manager when one
is appointed
Emphasize the importance of
identifying and documenting
risks, and to develop contingency
plans
Since the project manager is
accountable for the outcome of
the project, it is reasonable to
accept his position
Inform the project manager of
intent to conduct a review of the
risks at the completion of the
requirements definition phase of
the project